CN103530153B - User power utilization information acquisition terminal remote upgrade method - Google Patents

User power utilization information acquisition terminal remote upgrade method Download PDF

Info

Publication number
CN103530153B
CN103530153B CN201310471577.6A CN201310471577A CN103530153B CN 103530153 B CN103530153 B CN 103530153B CN 201310471577 A CN201310471577 A CN 201310471577A CN 103530153 B CN103530153 B CN 103530153B
Authority
CN
China
Prior art keywords
whole
main website
files
acquisition terminal
upgrading terminals
Prior art date
Application number
CN201310471577.6A
Other languages
Chinese (zh)
Other versions
CN103530153A (en
Inventor
高友会
仝开乐
周宇
张建培
Original Assignee
光一科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 光一科技股份有限公司 filed Critical 光一科技股份有限公司
Priority to CN201310471577.6A priority Critical patent/CN103530153B/en
Publication of CN103530153A publication Critical patent/CN103530153A/en
Application granted granted Critical
Publication of CN103530153B publication Critical patent/CN103530153B/en

Links

Abstract

The present invention relates to user power utilization information acquisition terminal remote upgrade method, including: main website selects an acquisition terminal to be current upgrading terminals;Main website sends each frame blocks of files and single frames verification data to current upgrading terminals;Current upgrading terminals verifies each frame blocks of files;Main website sends whole file verification data to current upgrading terminals;Current upgrading terminals verifies whole program upgrade file;Current upgrading terminals upgrading processing terminates;Main station judging the most all acquisition terminals upgrading processing terminates, if otherwise selecting next acquisition terminal to be current upgrading terminals and go to second step, if then remote upgrade terminates.The present invention can realize the remote upgrade to acquisition terminal and safeguard, thoroughly overcomes the defect of tradition upgrade method.

Description

User power utilization information acquisition terminal remote upgrade method
Technical field
The present invention relates to a kind of user power utilization information acquisition terminal remote upgrade method, remote upgrade maintenance terminal can be realized Equipment.
Background technology
According to the applicant understood, user power utilization information acquisition system can be national grid " SG186 engineering " provide user in real time/ History power information data, it is possible to provide distribution transformer, common transformer, rural comprehensive for low and medium voltage distribution network, rural power grid Real-time/the historical data of transformer etc. and operating mode ruuning situation.User power utilization information acquisition system can be by built electric power Communication network, provides in real time/history power information quickly and easily, strengthens self work for State Grid Corporation of China and carries to client Data supporting is provided for high-quality power supply service.
User power utilization information acquisition system generally includes the acquisition terminal being dispersed in each collection point, and leads to acquisition terminal The main website server that letter connects.During safeguarding user power utilization information acquisition system, often increase function, solution because of demand change The reasons such as the most on-the-spot operation problem, optimization program circuit, need to implement each acquisition terminal upgrade maintenance operation.Traditional upgrading Mode is " artificial local upgrade " mode, is i.e. carried out this by technical support personnel's carried terminal ROMPaq to acquisition terminal scene Ground upgrading.But, owing to acquisition terminal quantity is many, distributional region is wide, decentralization is high, field running environment is poor, this traditional Upgrading mode cannot meet the requirement of batch processing, high-timeliness, and upgrade every time and all can take substantial amounts of manpower and materials money Source, adds the operation cost of user power utilization information acquisition system.
Summary of the invention
The technical problem to be solved is: the problem existed for prior art, proposes a kind of user power utilization letter Breath acquisition terminal remote upgrade method, it is achieved safeguard the remote upgrade of acquisition terminal, thoroughly overcomes lacking of tradition upgrade method Fall into.
The technical scheme that the present invention solves its technical problem is as follows:
A kind of user power utilization information acquisition terminal remote upgrade method, is characterized in that, comprise the following steps:
The first step, main website select an acquisition terminal to be current upgrading terminals;
Second step, main website are sent each frame being split to form in advance by whole program upgrade file to current upgrading terminals by frame Blocks of files and the single frames verification data that through single frames checking algorithm draw corresponding with each frame blocks of files;Current upgrading terminals is pressed Described single frames checking algorithm verifies each frame blocks of files;
3rd step, main website send corresponding with whole program upgrade file through whole file verification algorithm to current upgrading terminals The whole file verification data drawn;Current upgrading terminals verifies whole program upgrade file by described whole file verification algorithm;
4th step, current upgrading terminals upgrading processing terminate;Main station judging the most all acquisition terminals upgrading processing terminates, If otherwise selecting next acquisition terminal to be current upgrading terminals and go to second step, if then remote upgrade terminates.
Applicant finds in long-term in depth practical studies, although the size of acquisition terminal program upgrade file only has number Hundred KB are to number MB, but limited by the transmission of power communication net, it is impossible to disposably send program upgrade file to acquisition terminal, Program upgrade file can only be divided into some frame blocks of files, then send frame by frame to acquisition terminal.For guaranteeing this transmission mode Safety and reliability, applicant works out further and every frame blocks of files first performs verification, then to whole program upgrading literary composition Part performs the technological means of verification, ensures that program upgrade file sends like clockwork to acquisition terminal with this, it is to avoid data The possibility being stolen and usurp, farthest protects the safety of power information.
The technical scheme that the present invention is the most perfect is as follows:
Preferably, in second step, the single frames checking algorithm detailed process for each frame blocks of files is as follows:
S1. initialize: making variable W_CRC is 16 bits, and each bit value is zero;Make data pointer i=1;
S2. take 8, the left side of variable W_CRC and preserve to variable W_CRC1;Take 8, the right of variable W_CRC and preserve To variable W_CRC2;
S3. read the i-th byte data of present frame blocks of files, and these data carried out XOR with variable W_CRC2, Income value is N;
S4. with variable W_CRC1, the numerical value of the n-th sequence in cipher table being carried out XOR, income value preserves to variable W_CRC;Described cipher table is made up of the hexadecimal values predetermined order of at least 256 >=0x0 and≤0xffff;Described close The initial sequence number of code table is zero;
S5. data pointer i=i+1 is made, it is judged that it is complete whether present frame blocks of files reads, if then going to S6, if otherwise turning To S2;
S6. the numerical value of variable W_CRC is negated, obtain the single frames verification data of present frame blocks of files.
Preferably, in the 3rd step, the whole file verification algorithm detailed process for whole program upgrade file is as follows:
T1. initialize: making variable W_CS is 32 bits, and each bit value is zero;Make data pointer j=1;
T2. the i-th byte data of reading program upgrade file, and these data are done sums and computing with variable W_CS, institute Must be worth and preserve to variable W_CS;
T3. data pointer j=j+1 is made, it is judged that it is complete whether program upgrade file reads, if then going to T4, if otherwise turning To T2;
T4. the numerical value of variable W_CS is the whole file verification data of whole program upgrade file.
Above single frames checking algorithm and whole file verification algorithm are that applicant draws through going deep into practical studies further Be specially adapted for the checking algorithm of acquisition terminal program upgrade file, can be further assured that program upgrade file security and can By property.
Preferably, the detailed process of second step is as follows:
A1. initialize: make frame point k=1, make frame re-transmission frequency n=0;
A2. main website sends kth frame blocks of files to current upgrading terminals, and sends corresponding with kth frame blocks of files through single frames The single frames verification data that checking algorithm draws;
A3. current upgrading terminals is calculated the single frames verification data of kth frame blocks of files by described single frames checking algorithm, and judges Whether it is consistent with the single frames verification data received;If being consistent, current upgrading terminals returns successfully message, main website record to main website Current upgrading terminals has downloaded kth frame blocks of files, goes to A4;If not corresponding, current upgrading terminals returns to retransmit to main website and asks Asking, main website makes frame re-transmission frequency n=n+1, and judge n whether more than predetermined value, if the then current upgrading terminals of main website record the K frame blocks of files verification exception also goes to the 4th step, if otherwise going to A2;
A4. making frame point k=k+1, main station judging the most all frames blocks of files is sent, if then going to the 3rd step, If otherwise going to A2.
Above-mentioned optimal technical scheme is that applicant draws through going deep into practical studies further, can effectively guarantee each frame file The security of block, can feed back the abnormal acquisition terminal of upgrading in time, be easy to overhaul the most in time, moreover it is possible to record gathers eventually End downloading process, be easy to when communication condition is poor realize breakpoint transmission.
Preferably, the detailed process of the 3rd step is as follows:
B1. main website sends through whole file verification algorithm draw corresponding with whole program upgrade file to current upgrading terminals Whole file verification data;
B2. current upgrading terminals is calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm According to, and judge whether to be consistent with the whole file verification data received;If being consistent, go to B3;If not corresponding, main website record is current Upgrading terminals whole file verification exception also goes to the 4th step;
B3. action is restarted in current upgrading terminals execution reset, and is transferred to from temporary storage area by program upgrade file Formal application area, is then calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm According to, and judge whether to be consistent with the whole file verification data received;If being consistent, the current upgrading terminals of main website record upgrades successfully, Go to the 4th step;If not corresponding, main website record current upgrading terminals file transfer exception also goes to the 4th step.
Above-mentioned optimal technical scheme is that applicant draws through going deep into practical studies further, can effectively guarantee whole program The security of upgrade file, can feed back the abnormal acquisition terminal of upgrading in time, be easy to overhaul the most in time.
Preferably, the main website preparation process being positioned at before the first step, the detailed process of described main website preparation process are also included As follows:
C1. inquiry acquisition terminal program version, it would be desirable to the acquisition terminal of upgrading lists upgrading terminals inventory in;
C2. option program upgrade file, draws whole file verification data by described whole file verification algorithm;Program is upgraded File division is some frame blocks of files, and draws the single frames verification data of each frame blocks of files by described single frames checking algorithm;
C3. the acquisition terminal communication channel in upgrading terminals inventory is switched to update channel;Go to the first step;
The detailed process of the described first step is: main website selects an acquisition terminal for currently to upgrade end in upgrading terminals inventory End;
Also include being positioned at the main website subsequent processing steps after the 4th step, the detailed process of described main website subsequent processing steps As follows: each acquisition terminal program version in inquiry upgrading terminals inventory, and contrast with the version of this secondary program upgrade file, by version The inconsistent acquisition terminal state recording of this contrast is that upgrade status is abnormal, and version contrasts consistent acquisition terminal communication channel Switch to information gathering channel.
Above-mentioned optimal technical scheme is that applicant draws through going deep into practical studies further, can make whole remote upgrade mistake Process automation, procedure process, thus the workload of equipment operation maintenance personnel is greatly decreased further, improve acquisition terminal remote The operating efficiency of journey upgrading.
Accompanying drawing explanation
Fig. 1 is the main process schematic diagram of the embodiment of the present invention.
Detailed description of the invention
It is described in further detail with reference to the accompanying drawings and in conjunction with the embodiments to the present invention.But the invention is not restricted to The example gone out.
Embodiment
As it is shown in figure 1, the user power utilization information acquisition terminal remote upgrade method of the present embodiment, comprise the following steps:
Main website preparation process:
C1. inquiry acquisition terminal program version, it would be desirable to the acquisition terminal of upgrading lists upgrading terminals inventory in;
C2. option program upgrade file, draws whole file verification data by described whole file verification algorithm;Program is upgraded File division is some frame blocks of files, and draws the single frames verification data of each frame blocks of files by described single frames checking algorithm;
C3. the acquisition terminal communication channel in upgrading terminals inventory is switched to update channel;Go to the first step.
The first step, main website select an acquisition terminal to be current upgrading terminals in upgrading terminals inventory.
Second step, main website are sent each frame being split to form in advance by whole program upgrade file to current upgrading terminals by frame Blocks of files and the single frames verification data that through single frames checking algorithm draw corresponding with each frame blocks of files;Current upgrading terminals is pressed Described single frames checking algorithm verifies each frame blocks of files;
Detailed process is as follows:
A1. initialize: make frame point k=1, make frame re-transmission frequency n=0;
A2. main website sends kth frame blocks of files to current upgrading terminals, and sends corresponding with kth frame blocks of files through single frames The single frames verification data that checking algorithm draws;
A3. current upgrading terminals is calculated the single frames verification data of kth frame blocks of files by described single frames checking algorithm, and judges Whether it is consistent with the single frames verification data received;If being consistent, current upgrading terminals returns successfully message, main website record to main website Current upgrading terminals has downloaded kth frame blocks of files, goes to A4;If not corresponding, current upgrading terminals returns to retransmit to main website and asks Asking, main website makes frame re-transmission frequency n=n+1, and judge n whether more than predetermined value, if the then current upgrading terminals of main website record the K frame blocks of files verification exception also goes to the 4th step, if otherwise going to A2;
A4. making frame point k=k+1, main station judging the most all frames blocks of files is sent, if then going to the 3rd step, If otherwise going to A2.
3rd step, main website send corresponding with whole program upgrade file through whole file verification algorithm to current upgrading terminals The whole file verification data drawn;Current upgrading terminals verifies whole program upgrade file by described whole file verification algorithm;
Detailed process is as follows:
B1. main website sends through whole file verification algorithm draw corresponding with whole program upgrade file to current upgrading terminals Whole file verification data;
B2. current upgrading terminals is calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm According to, and judge whether to be consistent with the whole file verification data received;If being consistent, go to B3;If not corresponding, main website record is current Upgrading terminals whole file verification exception also goes to the 4th step;
B3. action is restarted in current upgrading terminals execution reset, and is transferred to from temporary storage area by program upgrade file Formal application area, is then calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm According to, and judge whether to be consistent with the whole file verification data received;If being consistent, the current upgrading terminals of main website record upgrades successfully, Go to the 4th step;If not corresponding, main website record current upgrading terminals file transfer exception also goes to the 4th step.
4th step, current upgrading terminals upgrading processing terminate;Main station judging the most all acquisition terminals upgrading processing terminates, If otherwise selecting next acquisition terminal to be current upgrading terminals and go to second step, if then remote upgrade terminates.
Main website subsequent processing steps: inquiry upgrading terminals inventory in each acquisition terminal program version, and with this secondary program liter The version contrast of level file, it is that upgrade status is abnormal that version contrasts inconsistent acquisition terminal state recording, is contrasted by version Consistent acquisition terminal communication channel switches to information gathering channel.
Wherein, in second step, the single frames checking algorithm detailed process for each frame blocks of files is as follows:
S1. initialize: making variable W_CRC is 16 bits, and each bit value is zero;Make data pointer i=1;
S2. take 8, the left side of variable W_CRC and preserve to variable W_CRC1;Take 8, the right of variable W_CRC and preserve To variable W_CRC2;
S3. read the i-th byte data of present frame blocks of files, and these data carried out XOR with variable W_CRC2, Income value is N;
S4. with variable W_CRC1, the numerical value of the n-th sequence in cipher table being carried out XOR, income value preserves to variable W_CRC;Cipher table is made up of the hexadecimal values predetermined order of at least 256 >=0x0 and≤0xffff;Rising of cipher table Beginning sequence number is zero;
S5. data pointer i=i+1 is made, it is judged that it is complete whether present frame blocks of files reads, if then going to S6, if otherwise turning To S2;
S6. the numerical value of variable W_CRC is negated, obtain the single frames verification data of present frame blocks of files.
For ease of understanding single frames checking algorithm, lift an application example:
Certain frame blocks of files contains two byte datas, and the 1st byte data is 10110011, and the 2nd byte data is 01011010.Left Moving is logical shift left, moves to right as logic shift right.
Cipher table is as shown in the table, and containing 256 hexadecimal values, order also represents with hexadecimal values:
Order 00 01 02 03 04 05 06 07 08 09
Numerical value 0x0000 0x365e 0x6cbc 0x5ae2 0xd978 0xef26 0xb5c4 0x839a 0xff89 0xc9d7
Order 0A 0B 0C 0D 0E 0F 10 11 12 13
Numerical value 0x9335 0xa56b 0x26f1 0x10af 0x4a4d 0x7c13 0xb26b 0x8435 0xded7 0xe889
Order 14 15 16 17 18 19 1A 1B 1C 1D
Numerical value 0x6b13 0x5d4d 0x07af 0x31f1 0x4de2 0x7bbc 0x215e 0x1700 0x949a 0xa2c4
Order 1E 1F 20 21 22 23 24 25 26 27
Numerical value 0xf826 0xce78 0x29af 0x1ff1 0x4513 0x734d 0xf0d7 0xc689 0x9c6b 0xaa35
Order 28 29 2A 2B 2C 2D 2E 2F 30 31
Numerical value 0xd626 0xe078 0xba9a 0x8cc4 0x0f5e 0x3900 0x63e2 0x55bc 0x9bc4 0xad9a
Order 32 33 34 35 36 37 38 39 3A 3B
Numerical value 0xf778 0xc126 0x42bc 0x74e2 0x2e00 0x185e 0x644d 0x5213 0x08f1 0x3eaf
Order 3C 3D 3E 3F 40 41 42 43 44 45
Numerical value 0xbd35 0x8b6b 0xd189 0xe7d7 0x535e 0x6500 0x3fe2 0x09bc 0x8a26 0xbc78
Order 46 47 48 49 4A 4B 4C 4D 4E 4F
Numerical value 0xe69a 0xd0c4 0xacd7 0x9a89 0xc06b 0xf635 0x75af 0x43f1 0x1913 0x2f4d
Order 50 51 52 53 54 55 56 57 58 59
Numerical value 0xe135 0xd76b 0x8d89 0xbbd7 0x384d 0x0e13 0x54f1 0x62af 0x1ebc 0x28e2
Order 5A 5B 5C 5D 5E 5F 60 61 62 63
Numerical value 0x7200 0x445e 0xc7c4 0xf19a 0xab78 0x9d26 0x7af1 0x4caf 0x164d 0x2013
Order 64 65 66 67 68 69 6A 6B 6C 6D
Numerical value 0xa389 0x95d7 0xcf35 0xf96b 0x8578 0xb326 0xe9c4 0xdf9a 0x5c00 0x6a5e
Order 6E 6F 70 71 72 73 74 75 76 77
Numerical value 0x30bc 0x06e2 0xc89a 0xfec4 0xa426 0x9278 0x11e2 0x27bc 0x7d5e 0x4b00
Order 78 79 7A 7B 7C 7D 7E 7F 80 81
Numerical value 0x3713 0x014d 0x5baf 0x6df1 0xee6b 0xd835 0x82d7 0xb489 0xa6bc 0x90e2
Order 82 83 84 85 86 87 88 89 8A 8B
Numerical value 0xca00 0xfc5e 0x7fc4 0x499a 0x1378 0x2526 0x5935 0x6f6b 0x3589 0x03d7
Order 8C 8D 8E 8F 90 91 92 93 94 95
Numerical value 0x804d 0xb613 0xecf1 0xdaaf 0x14d7 0x2289 0x786b 0x4e35 0xcdaf 0xfbf1
Order 96 97 98 99 9A 9B 9C 9D 9E 9F
Numerical value 0xa113 0x974d 0xeb5e 0xdd00 0x87e2 0xb1bc 0x3226 0x0478 0x5e9a 0x68c4
Order A0 A1 A2 A3 A4 A5 A6 A7 A8 A9
Numerical value 0x8f13 0xb94d 0xe3af 0xd5f1 0x566b 0x6035 0x3ad7 0x0c89 0x709a 0x46c4
Order AA AB AC AD AE AF B0 B1 B2 B3
Numerical value 0x1c26 0x2a78 0xa9e2 0x9fbc 0xc55e 0xf300 0x3d78 0x0b26 0x51c4 0x679a
Order B4 B5 B6 B7 B8 B9 BA BB BC BD
Numerical value 0xe400 0xd25e 0x88bc 0xbee2 0xc2f1 0xf4af 0xae4d 0x9813 0x1b89 0x2dd7
Order BE BF C0 C1 C2 C3 C4 C5 C6 C7
Numerical value 0x7735 0x416b 0xf5e2 0xc3bc 0x995e 0xaf00 0x2c9a 0x1ac4 0x4026 0x7678
Order C8 C9 CA CB CC CD CE CF D0 D1
Numerical value 0x0a6b 0x3c35 0x66d7 0x5089 0xd313 0xe54d 0xbfaf 0x89f1 0x4789 0x71d7
Order D2 D3 D4 D5 D6 D7 D8 D9 DA DB
Numerical value 0x2b35 0x1d6b 0x9ef1 0xa8af 0xf24d 0xc413 0xb800 0x8e5e 0xd4bc 0xe2e2
Order DC DD DE DF E0 E1 E2 E3 E4 E5
Numerical value 0x6178 0x5726 0x0dc4 0x3b9a 0xdc4d 0xea13 0xb0f1 0x86af 0x0535 0x336b
Order E6 E7 E8 E9 EA EB EC ED EE EF
Numerical value 0x6989 0x5fd7 0x23c4 0x159a 0x4f78 0x7926 0xfabc 0xcce2 0x9600 0xa05e
Order F0 F1 F2 F3 F4 F5 F6 F7 F8 F9
Numerical value 0x6e26 0x5878 0x029a 0x34c4 0xb75e 0x8100 0xdbe2 0xedbc 0x91af 0xa7f1
Order FA FB FC FD FE FF
Numerical value 0xfd13 0xcb4d 0x48d7 0x7e89 0x246b 0x1235
The single frames verification data calculation process of this frame blocks of files is as follows:
(1) S1. variable W_CR=00000000 00000000 is performed;i=1;
(2) S2. variable W_CRC1=00000000 00000000, variable W_CRC2=0000000000000000 are performed;
(3) the 1st byte data=10110011 of execution S3. present frame blocks of files, i.e. 0000000010110011, should Data and variable W_CRC2 carry out XOR, income value N=0000000010110011=0x00B3;
(4) performing the numerical value of 0x00B3 order in S4. cipher table is 0x679a=0110011110011010, by this number Value and variable W_CRC1 carry out XOR, income value=0110011110011010, preserve, i.e. variable W_CRC=01100111 10011010;
(5) performing S5.i=i+1=2, present frame blocks of files not yet reads complete, goes to S2;
(6) S2. variable W_CRC1=00000000 01100111 (0x0067), variable W_CRC2=00000000 are performed 10011010(0x009a);
(7) the 2nd byte data=01011010 of execution S3. present frame blocks of files, i.e. 0000000001011010, should Data and variable W_CRC2 carry out XOR, income value N=0000000011000000=0x00C0;
(8) performing the numerical value of 0x00C0 order in S4. cipher table is 0xf5e2=1111010111100010, by this number Value and variable W_CRC1 carry out XOR, income value=1111010110000101, preserve, i.e. variable W_CRC=11110101 10000101;
(9) performing S5.i=i+1=3, present frame blocks of files has read complete, has gone to S6;
(10) perform S6. the numerical value of variable W_CRC is negated, obtain present frame blocks of files single frames verification data= 00001010 01111010。
Additionally, in the 3rd step, the whole file verification algorithm detailed process for whole program upgrade file is as follows:
T1. initialize: making variable W_CS is 32 bits, and each bit value is zero;Make data pointer j=1;
T2. the i-th byte data of reading program upgrade file, and these data are done sums and computing with variable W_CS, institute Must be worth and preserve to variable W_CS;
T3. data pointer j=j+1 is made, it is judged that it is complete whether program upgrade file reads, if then going to T4, if otherwise turning To T2;
T4. the numerical value of variable W_CS is the whole file verification data of whole program upgrade file.
The present embodiment can be applicable in user power utilization information acquisition system, utilizes the power communication net built up in system Network, on the basis of existing power information acquisition system function, is automatically obtained the remote upgrade maintenance work to on-site terminal equipment, Make on-site terminal equipment realize remotely increasing function, the design of optimization system, the user's request of solution continuous renewal, thoroughly overcome biography The defect of system upgrade method, saves a large amount of manpower and materials.
In addition to the implementation, the present invention can also have other embodiments.All employing equivalents or equivalent transformation shape The technical scheme become, all falls within the protection domain of application claims.

Claims (9)

1. a user power utilization information acquisition terminal remote upgrade method, is characterized in that, comprises the following steps:
The first step, main website select an acquisition terminal to be current upgrading terminals;
Second step, main website are sent each frame file being split to form in advance by whole program upgrade file to current upgrading terminals by frame Block and the single frames verification data that through single frames checking algorithm draw corresponding with each frame blocks of files;Current upgrading terminals is by described Single frames checking algorithm verifies each frame blocks of files;
3rd step, main website send through whole file verification algorithm draw corresponding with whole program upgrade file to current upgrading terminals Whole file verification data;Current upgrading terminals verifies whole program upgrade file by described whole file verification algorithm;
4th step, current upgrading terminals upgrading processing terminate;Main station judging the most all acquisition terminals upgrading processing terminates, if not Next acquisition terminal is then selected to be current upgrading terminals and go to second step, if then remote upgrade terminates;
In second step, the single frames checking algorithm detailed process for each frame blocks of files is as follows:
S1. initialize: making variable W_CRC is 16 bits, and each bit value is zero;Make data pointer i=1;
S2. take 8, the left side of variable W_CRC and preserve to variable W_CRC1;Take 8, the right of variable W_CRC and preserve to becoming Amount W_CRC2;
S3. read the i-th byte data of present frame blocks of files, and these data are carried out XOR, gained with variable W_CRC2 Value is N;
S4. with variable W_CRC1, the numerical value of the n-th sequence in cipher table being carried out XOR, income value preserves to variable W_ CRC;Described cipher table is made up of the hexadecimal values predetermined order of at least 256 >=0x0 and≤0xffff;Described password The initial sequence number of table is zero;
S5. data pointer i=i+1 is made, it is judged that it is complete whether present frame blocks of files reads, if then going to S6, if otherwise going to S2;
S6. the numerical value of variable W_CRC is negated, obtain the single frames verification data of present frame blocks of files.
The most according to claim 1, user power utilization information acquisition terminal remote upgrade method, is characterized in that, in the 3rd step, and pin As follows to the whole file verification algorithm detailed process of whole program upgrade file:
T1. initialize: making variable W_CS is 32 bits, and each bit value is zero;Make data pointer j=1;
T2. the i-th byte data of reading program upgrade file, and these data are done sums and computing with variable W_CS, income value Preserve to variable W_CS;
T3. data pointer j=j+1 is made, it is judged that it is complete whether program upgrade file reads, if then going to T4, if otherwise going to T2;
T4. the numerical value of variable W_CS is the whole file verification data of whole program upgrade file.
User power utilization information acquisition terminal remote upgrade method the most according to claim 1 or claim 2, is characterized in that, second step Detailed process is as follows:
A1. initialize: make frame point k=1, make frame re-transmission frequency n=0;
A2. main website sends kth frame blocks of files to current upgrading terminals, and sends verify through single frames corresponding with kth frame blocks of files The single frames verification data that algorithm draws;
A3. current upgrading terminals is calculated the single frames verification data of kth frame blocks of files by described single frames checking algorithm, and judges whether It is consistent with the single frames verification data received;If being consistent, current upgrading terminals returns successfully message to main website, and main website record is current Upgrading terminals has downloaded kth frame blocks of files, goes to A4;If not corresponding, current upgrading terminals returns, to main website, the request of repeating transmission, main Station makes frame re-transmission frequency n=n+1, and judges whether n is more than predetermined value, if then main website record current upgrading terminals kth frame Blocks of files verification exception also goes to the 4th step, if otherwise going to A2;
A4. making frame point k=k+1, main station judging the most all frames blocks of files is sent, if then going to the 3rd step, if Otherwise go to A2.
The most according to claim 3, user power utilization information acquisition terminal remote upgrade method, is characterized in that, the 3rd step concrete Process is as follows:
B1. main website to current upgrading terminals send corresponding with whole program upgrade file through whole file verification algorithm draw whole File verification data;
B2. current upgrading terminals is calculated the whole file verification data of whole program upgrade file by described whole file verification algorithm, And judge whether to be consistent with the whole file verification data received;If being consistent, go to B3;If not corresponding, main website record currently rises Level terminal whole file verification exception also goes to the 4th step;
B3. action is restarted in current upgrading terminals execution reset, and is transferred to formally from temporary storage area by program upgrade file Application area, is then calculated the whole file verification data of whole program upgrade file by described whole file verification algorithm, and The whole file verification data judged whether and receive are consistent;If being consistent, the current upgrading terminals of main website record upgrades successfully, and goes to 4th step;If not corresponding, main website record current upgrading terminals file transfer exception also goes to the 4th step.
The most according to claim 4, user power utilization information acquisition terminal remote upgrade method, is characterized in that, also includes being positioned at Main website preparation process before one step, the detailed process of described main website preparation process is as follows:
C1. inquiry acquisition terminal program version, it would be desirable to the acquisition terminal of upgrading lists upgrading terminals inventory in;
C2. option program upgrade file, draws whole file verification data by described whole file verification algorithm;By program upgrade file It is divided into some frame blocks of files, and draws the single frames verification data of each frame blocks of files by described single frames checking algorithm;
C3. the acquisition terminal communication channel in upgrading terminals inventory is switched to update channel;Go to the first step;
The detailed process of the described first step is: main website selects an acquisition terminal to be current upgrading terminals in upgrading terminals inventory;
Also including being positioned at the main website subsequent processing steps after the 4th step, the detailed process of described main website subsequent processing steps is such as Under: each acquisition terminal program version in inquiry upgrading terminals inventory, and contrast with the version of this secondary program upgrade file, by version Contrasting inconsistent acquisition terminal state recording is that upgrade status is abnormal, version contrasts consistent acquisition terminal communication channel and cuts Shift to information gathering channel.
CN201310471577.6A 2013-10-11 2013-10-11 User power utilization information acquisition terminal remote upgrade method CN103530153B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310471577.6A CN103530153B (en) 2013-10-11 2013-10-11 User power utilization information acquisition terminal remote upgrade method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310471577.6A CN103530153B (en) 2013-10-11 2013-10-11 User power utilization information acquisition terminal remote upgrade method

Publications (2)

Publication Number Publication Date
CN103530153A CN103530153A (en) 2014-01-22
CN103530153B true CN103530153B (en) 2016-08-17

Family

ID=49932193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310471577.6A CN103530153B (en) 2013-10-11 2013-10-11 User power utilization information acquisition terminal remote upgrade method

Country Status (1)

Country Link
CN (1) CN103530153B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104049996A (en) * 2014-05-29 2014-09-17 湖北三江航天红峰控制有限公司 Method for carrying out software updating of missile-borne computer based on serial port
CN106453642A (en) * 2016-11-28 2017-02-22 国网四川省电力公司眉山供电公司 Linux dynamic link library-based method of rapidly upgrading electric energy data acquire terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201345041Y (en) * 2008-09-11 2009-11-11 周庆民 Field data acquisition terminal capable of upgrading programs remotely
CN102541604A (en) * 2011-12-29 2012-07-04 深圳市共进电子股份有限公司 Remote upgrading method, remote upgrading terminal equipment and remote upgrading system
CN202404574U (en) * 2011-12-20 2012-08-29 郑州伊海电气设备有限公司 Electric energy collecting terminal with remote upgrade function
CN102857380A (en) * 2012-09-18 2013-01-02 珠海中慧微电子有限公司 Remote upgrading method for power line carrier communication routing
CN202838671U (en) * 2012-09-10 2013-03-27 江阴长仪集团有限公司 Centralized meter reading terminal supporting remote upgrade and information two-way transmission

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201345041Y (en) * 2008-09-11 2009-11-11 周庆民 Field data acquisition terminal capable of upgrading programs remotely
CN202404574U (en) * 2011-12-20 2012-08-29 郑州伊海电气设备有限公司 Electric energy collecting terminal with remote upgrade function
CN102541604A (en) * 2011-12-29 2012-07-04 深圳市共进电子股份有限公司 Remote upgrading method, remote upgrading terminal equipment and remote upgrading system
CN202838671U (en) * 2012-09-10 2013-03-27 江阴长仪集团有限公司 Centralized meter reading terminal supporting remote upgrade and information two-way transmission
CN102857380A (en) * 2012-09-18 2013-01-02 珠海中慧微电子有限公司 Remote upgrading method for power line carrier communication routing

Also Published As

Publication number Publication date
CN103530153A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
EP2429126B1 (en) Systems and methods for the configuration of substation remote terminals with a central controller
CN103516541B (en) Configuration information automatic management method based on Intelligent transformer station
CN103379136B (en) Compression method and decompression method of log acquisition data, compression apparatus and decompression apparatus of log acquisition data
CN103457354B (en) A kind of secondary equipment of intelligent converting station moves O&M method and device thereof
CN101888655B (en) Method and device for configuring network element data in template way in network management system
CN103199624B (en) Smart converting station based on international electrotechnical commission (IEC) 61850
CN104737566B (en) Method for introducing user ID data in subscriber identity module
CN104134173B (en) Based on the main distribution figure/analog integrated system remotely having access to information exchange
CN104394008B (en) A kind of method and its system of unified configuration different type interchanger
CN103326465B (en) A kind of power distribution network terminal cut-in method based on IEC61850 standard
CN104899325A (en) APP (application) acquired data collection method, terminal, server and system
CN102223651B (en) Method for assisting base station in self starting and RNC (Radio Network Controller)/DHCP (Dynamic Host Configuration Protocol) server
CN104243595A (en) IPv6 (Internet protocol version 6) based electricity information collection system and method
CN104065521B (en) A kind of collection, analysis and the delivery system and its method of electric power networks device log and configuration file
CN103869771A (en) Environment monitoring system
CN105391684A (en) Centralized management method and centralized management device for strategies
CN103218398B (en) Intelligent substation SCL (substation configuration description language) file difference comparison method
US10325062B2 (en) Method and device for generating engineering topology of digital substation
CN101848438B (en) Method for remotely modifying network-locking parameter
CN103874113B (en) Wireless network maintaining method, device and system
CN102065413B (en) Database updating method and system, and base station self-starting method and system
CN102185383A (en) Method and system for realizing data sharing between power distribution main station system and power distribution GIS (Geographic Information System)
TWI223520B (en) Wireless network receiver and method for performing message integrity check of service data unit thereof
CN103902763A (en) Automatic matching method of virtual terminals of cross-interval device of intelligent substation
CN1705245A (en) Authentication and connection method between mobile phones having bluetooth module

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
C14 Grant of patent or utility model